Pages

Power grid cyber security in chaos

Power grid cyber security 'in chaos'
Hartford Business
Cyber security of the power grid is an often overlooked issue that could bring Connecticut, New England and possibly the country to its knees. While utilities, power generators and the grid administrator all value security, the electricity system is so ...

Cyber-warriors combat mysterious 'worm'
Buffalo News
It is a threat largely hidden from the general public, but one understood all too well by the brightest minds in cybersecurity and computer programming. In “Worm: The First Digital World War,” author Mark Bowden attempts to convince his readers of the ...

Weekly News Roundup: Lockheed Martin (NYSE:LMT)
StocksandShares.TV
Lockheed Martin (NYSE:LMT) has opened a cyber security center is Australia. The defense contractor Lockheed Martin (NYSE:LMT) has opened its next generation cyber security center in Australia, offering 200 new job opportunities in the country. ...

Most SL Facebook complaints from females on identity theft
Sunday Times.lk
... the identity of mostly real life Sri Lankan females; according to Kanishka Yapa, Information Security Engineer at SL CERT, the Information and Communication Technology Agency-subsidiary that has been tasked with national cyber security protection. ...

Boeing sees growth potential in Mideast
AFP
On defence... unmanned systems, intelligence, surveillance and reconnaissance and also cybersecurity have become very important today." The Boeing 787 Dreamliner, which began service last month and is the Boeing star display at this year's airshow, ...

Community Portrait: Brevard County [Florida Trend]
Insurance News Net (press release)
The area also is emerging as a hub for several cybersecurity firms and security-related research at the Florida Institute of Technology . Other notable pieces of the county's economic base include Port Canaveral, the world's second-busiest cruise ship ...

Devesh Kapur: The Indian state and India's future
Business Standard
But when it comes to fundamental new challenges like cyber security, where cutting-edge talent is probably in its teens, the manner in which the Indian state is approaching is not just inadequate but also positively harmful. More than a century ago, ...

Hostage taking: Nigeria ranks 4th in the world
Vanguard
An FBI agent, Ms Jennifer Dent, who disclosed the ranking of Nigeria as number four in the world in hostage taking in Lagos, also identified Nigeria as the greatest threat to cyber security in Africa. Speaking at a lecture organized by the Hubert H ...

Republicans Remain Unclear on Foreign Policy
The Atlantic
And this whole issue of allowing cybersecurity to go on, we need to use all of our resources. The private sector working along with our government to really-- standing up to cyber-command in 2010 was a good start on that. But fighting this cyberwar I ...

Adopt tough stand against China: Mitt Romney
Zee News
And this whole issue of allowing cyber-security to go on, we need to use all of our resources," he said. The private sector, working along with the government to standing up the cyber-command in 2010, was a good start on that front, Perry said. ...

US wins Twitter battle against foreign WikiLeaks collaborator
ZDNet (blog)
He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the US Strategic Perspective Institute as well ...

Post-9/11 vets struggle to find work, but there are rays of hope
Annapolis Capital
More and more veterans are exiting the military with cybersecurity and information technology training, which are in high demand in corporate America, Brown said. "Business owners have to feel ... they owe these veterans something," Brown said. ...

Always use caution in cyberspace
Amarillo.com
Estimates are that 85 percent of threats in cyberspace can be eliminated with proper cybersecurity“hygiene.” Good cyber “hygiene” means doing those commonsense things that reduce the chances that we will become a victim. Using antivirus software and ...

Chemical Facility Security News: Congressional Hearings – Week of ...
By PJCoyle
The Subcommittee on Crime, Terrorism, and Homeland Security of the House Judiciary Committee will be holding a hearing on Thursday about cyber security. Politically this is an impressive array of witnesses, including Michael Chertoff, but ...
Chemical Facility Security News

US Works to Counter Electronic Spy Risks
Wall Street Journal
That access could also provide an avenue for eavesdropping on phone calls or intercepting emails in combination with other technologies, said James Lewis, a cybersecurity specialist at the Center for Strategic and International Studies, a Washington ...

Notorious Malware Gives Shoutout To Showtime's 'Dexter'
TPM
The authors of the Duqu malware are apparently big fans of the Showtime series 'Dexter,' because they've inserted a reference to it in the code of the malware's exploit, Russian cybersecurity firm Kapersky Labs has discovered. ...

Breach exposes data at VCU
Richmond Times Dispatch
Virginia Commonwealth University will hire an outside cybersecurity consultant to examine its information technology system after a computer server containing personal data on 176567 people was hacked last month. The university has "very good forensic ...

Pull The Cyber War Trigger, If We Have To
AOL Defense
Such attitudes are not only counter-productive, they undermine our current cyber security efforts as well as the nation's security as a whole. There is plenty the nation can do to secure its cyber infrastructure and those efforts should be championed ...

DARPA Brings New Focus to Critical Area for...
defpro
... 2011 Nearly 700 experts from the cyber community—half of which were new to the DARPA cyber community—joined Agency and other Defense Department cyber leaders in Arlington, Va. at DARPA's “Colloquium on Future Directions in Cyber Security,” Monday ...

New SEC disclosure guidance about cyber security risks
Lexology (registration)
In addition to summarizing the new guidance, Mr. Brashear includes a list of questions that are intended to prompt a discussion—in a company's disclosure committee and otherwise—about changes in cyber security risks and to help create a written ...

'Google effect' means spies work harder, says ex-GCHQ chief
Telegraph.co.uk
He said the forthcoming update to the government's cyber security strategy should include lessons on internet security for school children. Carillion project : the Government's Communications Headquarters in Cheltenham.

FOREIGN POLICY DOSSIER: Jon Huntsman
National Journal
While others mock the Obama administration's engagement efforts with China, Huntsman supports calls for a strategic dialogue with Beijing, to include cybersecurity. “As far as you can see into the 21 st century, we are going to have to deal with China. ...

Income up 29% at Aecom
The Construction Index
“During the year, we integrated a number of acquisitions, which strengthened our capabilities in important end markets, including construction, power, energy, mining, and cyber security and intelligence. This enabled us to deliver record new wins of ...

Where the jobs will be
Toronto Star
Occupations waiting to be filled include designers of new technologies — cyber security and data analysis, for example — and especially management jobs that combine business and technology skills, including IT managers and chief information officers. ...

Veterans Day and the Heroes at Home
Huffington Post (blog)
Because she's getting a degree in cyber security, she's excited that Brandon is involved in the club's Lego League, a competition involving problem solving, technology and computing. "Their current project is preventing food borne illnesses," she says. ...

Raytheon grant expands job training for wounded veterans
Bizjournals.com
A record 539 students have completed courses in programs including information technology, cyber security and computer repair over the past year, a news release said. Many program graduates are employed as civilians in information technology jobs ...

Estonian Honorary Consulate Opens in Atlanta
GlobalAtlanta
He added that Estonia and Georgia share strengths in the bio-engineering, cyber-security and defense industries. Mr. Allpere was born in Estonia's capital Tallinn and moved to the US at 9 years old. He worked for Atlanta-based Coca-Cola Co. for 30 ...

'Twitter Manifesto' Confronts Gang Threats to Mexico Bloggers
InSight Crime
But when the document asks the government to better garantee "cybersecurity" and "freedom of speech" online, it only highlights the difficulty of enforcing these requests. Each new killing like "Rascatripas" reinforces the fear that Mexico may enter a ...

4 Defense Stocks to Buy for the Dividends
Investorplace.com
Raytheon (NYSE:RTN): If there are any winners in a leaner defense budget, this company's battle-tested Patriot missile, advanced cybersecurity and immigration control/identity management products will be among them. At $45.47, RTN is trading more than ...

IDB partners with CANTO to accelerate Broadband Development in the Region
Caribbean PressReleases.com (press release)
Some projects identified included developing broadband specific policies and goals, driving greater usage of the technology by small and medium-size enterprises (SMEs) and the public in general, creating harmonized solutions for cyber security, ...

1 Raindrop: Notes on Cybersecurity Research Agenda from Dan Geer
By Gunnar Peterson
A new cybersecurity reseach agenda from Dan Geer in three minutes or less - some snippets We would need a lot less research if we put into practice what we already know. But we don't. Ergo, why we don't put into practice what we already ...
1 Raindrop

Technology: The intersection of law and cybersecurity in
By Christopher Danzig
Legal Association Lists. Law Firm Associations · Professional Associations · Bar Associations · Market Your Firm · Home > Blogs >InsideCounsel >technology the intersection of law andcybersecurity in the age of wikileaks ...
InsideCounsel